Newest Edition With Verified Questions
And Answers A+ Graded And Verified
What activities occur when assessing security controls? (Select all that apply)
A Prepare the Plan of Action and Milestones (POA&M)
B Conduct final risk determination
C Develop, plan, and approve Security Assessment Plan
D Prepare Security Assessment Report (SAR) - CORRECT ANSWER C & D
Select ALL of the correct responses. What activities occur during implementation of
security
controls?
An Ensure consistency with DoD architectures
B Document security control implementation in the security plan
C Seek approvals from CIO
D Identify security controls available for inheritance
We Communicate updates to appropriate audiences
F Create appropriate training and communication plans - CORRECT ANSWER A, B &
D
,Which role leads the day-to-day defense?
An Authorizing Official (AO)
B US Cyber Command (USCYBERCOM)
C Security personnel
D DoD Chief Information Officer (CIO) - CORRECT ANSWER B
The cybersecurity attributes are confidentiality, integrity, availability, authentication, and:
A Validity
B Non-repudiation
C Architecture
D Stability - CORRECT ANSWER B
True or false? Cybersecurity is important so that risk is eliminated.
True
False - CORRECT ANSWER False
Select ALL of the correct responses. What are the Risk Management Framework (RMF)
steps?
designed to mitigate risk?
A Categorize System
B Select Security Controls
C Implement Security Controls
D Assess Security Controls - CORRECT ANSWER B & C
,What activities occur in Step 4 of the Risk Management Framework (RMF), Assess
Security
Controls?
A Develop, plan, and approve Security Assessment Plan
B Prepare the Security Assessment Report (SAR)
C Conduct remediation actions on non-compliant security controls
D All of the above - CORRECT ANSWER D
Select ALL of the correct responses. What are all cybersecurity attributes susceptible
to?
A Vulnerabilities
B Threats
C Disclosure
D Authorization - CORRECT ANSWER A & B
Select ALL of the correct responses. Which of the following are cybersecurity skill
standards needed?
by security personnel?
An Identify and manage all cybersecurity concepts
B Explain their role in protecting DoD's information systems
C Identify fundamental cybersecurity concepts that are related to the protection of
classified and
, controlled unclassified information
D Conduct assessment and evaluation of all IT systems - CORRECT ANSWER B & C
Which steps of the Risk Management Framework (RMF) are designed to evaluate risk?
A. Assess Security Controls, Monitor Security Controls, Categorize System
B. Assess Security Controls, Implement Security Controls, Authorize System
C. Implement Security Controls, Monitor Security Controls, Authorize System
D. Assess Security Controls, Monitor Security Controls, Authorize System - CORRECT
ANSWER D
In which step of the Risk Management Framework (RMF) would you implement the
decommissioning strategy?
A. Step 3 - Implement security controls
B. Step 4 - Assess security controls
C. Step 5 - Authorize system
D. Step 6 - Monitor security controls - CORRECT ANSWER D
What evolving threats are attempts by hackers to damage or destroy a computer
network or system?
A. Insider Threat
B. Social Media
C. Cyber Attack
D. Mobile Computing - CORRECT ANSWER C